US11916877B2 - System and method for the protected transmission of data - Google Patents

System and method for the protected transmission of data Download PDF

Info

Publication number
US11916877B2
US11916877B2 US16/764,503 US201816764503A US11916877B2 US 11916877 B2 US11916877 B2 US 11916877B2 US 201816764503 A US201816764503 A US 201816764503A US 11916877 B2 US11916877 B2 US 11916877B2
Authority
US
United States
Prior art keywords
vehicle
electronic filter
data
vehicle controller
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US16/764,503
Other languages
English (en)
Other versions
US20210014199A1 (en
Inventor
Georg Lohneis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Mobility GmbH
Original Assignee
Siemens Mobility GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Mobility GmbH filed Critical Siemens Mobility GmbH
Assigned to SIEMENS AKTIENGESELLSCHAFT reassignment SIEMENS AKTIENGESELLSCHAFT ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LOHNEIS, GEORG
Assigned to Siemens Mobility GmbH reassignment Siemens Mobility GmbH ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SIEMENS AKTIENGESELLSCHAFT
Publication of US20210014199A1 publication Critical patent/US20210014199A1/en
Application granted granted Critical
Publication of US11916877B2 publication Critical patent/US11916877B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L15/00Indicators provided on the vehicle or train for signalling purposes
    • B61L15/0018Communication with or on the vehicle or train
    • B61L15/0027Radio-based, e.g. using GSM-R
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B61RAILWAYS
    • B61LGUIDING RAILWAY TRAFFIC; ENSURING THE SAFETY OF RAILWAY TRAFFIC
    • B61L15/00Indicators provided on the vehicle or train for signalling purposes
    • B61L15/0018Communication with or on the vehicle or train
    • B61L15/0036Conductor-based, e.g. using CAN-Bus, train-line or optical fibres
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05DSYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
    • G05D1/00Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
    • G05D1/0011Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots associated with a remote control arrangement
    • G05D1/0022Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots associated with a remote control arrangement characterised by the communication link
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05DSYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
    • G05D1/00Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
    • G05D1/20Control system inputs
    • G05D1/22Command input arrangements
    • G05D1/221Remote-control arrangements
    • G05D1/226Communication links with the remote-control arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/48Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication

Definitions

  • the invention relates to a system for transmitting and receiving data, in particular for a rail vehicle, and a method for transmitting data.
  • Methods for intrusion detection are furthermore known which can be used to protect communication connections of the rail vehicle.
  • the software-based protection mechanisms can furthermore be manipulated by third parties, which can have disadvantageous repercussions on the operation of the rail vehicle.
  • third parties can have disadvantageous repercussions on the operation of the rail vehicle.
  • software-based protection of communication connections a risk always exists that modifications can be made to the software and the protective mechanisms of the rail vehicle can be bypassed.
  • the object of the invention is to propose a system and a method for manipulation-proof protection of a control level of a rail vehicle against third-party access.
  • a system for transmitting and receiving data, in particular for a rail vehicle.
  • the system has at least one in-vehicle control unit for processing and generating data.
  • At least one external server unit of the system has a communication device for establishing a communication connection to at least one in-vehicle interface.
  • the system further has at least one in-vehicle interface for transmitting data generated by the at least one in-vehicle control unit and for receiving data sent by the at least one external server unit.
  • the at least one in-vehicle control unit and the at least one in-vehicle interface are interconnected, having a data transmission capability, via an electronic filter device.
  • the communication connection between the at least one in-vehicle interface and the at least one control unit can be decoupled by a hardware filter.
  • the filter or the electronic filter device is designed on a hardware basis and can check and protect the data traffic between the in-vehicle interface and the at least one in-vehicle control system. It can thus be ensured that only permitted messages or data are forwarded to the at least one control system.
  • the at least one in-vehicle interface, the at least one in-vehicle control device and the electrical filter device can be disposed in a rail vehicle as part of its electrical components.
  • at least one rail vehicle can be a component of the system according to the invention.
  • a technically simple protection of the control systems of a rail vehicle can be guaranteed by means of this solution.
  • a manipulation-proof protection against unauthorized access to control systems of the rail vehicle can be implemented by means of the electronic filter device.
  • data transmitted between the at least one external server unit and the at least one in-vehicle control unit are verifiable by means of the electronic filter device.
  • the electronic filter device is preferably a device consisting of discrete electronic components, electively in combination with integrated circuits, with at least one function for checking a data stream.
  • the data stream or the data can be configured in the form of data packets or in the form of data messages. It can be ensured by means of the at least one filter function that only data or data messages which do not impact on an operational functionality of the at least one in-vehicle control unit are transmitted via physical interfaces of this type, such as, for example Ethernet, RS232 and the like.
  • data transmitted between the at least one external server unit and the at least one in-vehicle control unit are verifiable in terms of the validity and/or permissibility of the data by means of the electronic filter device.
  • the data can preferably be transmitted in the form of protocols or data packets. A syntax and/or the semantics of the protocols can be verified in order to check the validity and/or permissibility of the transmitted data packets. Depending on the result of the check, the data can then be forwarded unhindered or can be blocked.
  • the electronic filter device can preferably operate and check the data bidirectionally.
  • feedback messages generated by the at least one in-vehicle control unit in response to queries from an external server unit can also be securely transmitted.
  • the data or data packets blocked by the electronic filter device can be transmitted here back to the preceding component with an error message.
  • the at least one in-vehicle interface is a communication device for establishing a wireless or wired communication connection to the at least one external server unit.
  • the at least one interface may, for example, be a communication device for establishing a wireless communication connection.
  • the wireless communication connection can be based, for example, on a WLAN, UMTS, GSM, GPRS, LTE or similar transmission standard.
  • the at least one in-vehicle interface can be a wired interface for the provision of services, such as, for example, maintenance work, diagnostic work and the like. These functions can similarly be protected or checked by the electronic filter device.
  • the hardware filter or the electronic filter device is disposed, having a data transmission capability, between an interface designed as a service access and at least one in-vehicle control unit.
  • the at least one external server unit is a control center outside the vehicle or a control device outside the vehicle.
  • the at least one external server unit can thus be a computer system of a control center or of a railroad station which can communicate, having a data transmission capability, with a rail vehicle via a wireless communication connection.
  • the computer system has communication devices to perform a wireless data transmission.
  • the at least one external server unit can be a control device or a portable computer which can be coupled via a wireless or wired connection to the at least one in-vehicle interface.
  • the at least one external server unit can be a control device or a portable computer which can be coupled via a wireless or wired connection to the at least one in-vehicle interface.
  • the electronic filter device is deactivatable or activatable via a switch.
  • the electronic filter device can be disabled via a hardware switch in order to guarantee unrestricted data traffic, for example between a radio system and a control unit. This may be necessary, for example, in order to be able to access the control unit during a commissioning of the control unit.
  • the electronic filter device is deactivatable or activatable by the at least one in-vehicle control unit.
  • the electronic filter device can thereby be controllable by at least one in-vehicle control unit.
  • the switch can be actuatable directly by the at least one in-vehicle control unit in order to activate or deactivate the electronic filter device.
  • the at least one in-vehicle control unit can be connected directly to the electronic filter device so that the functional capability of the electronic filter device can be influenced directly by the at least one in-vehicle control unit.
  • the at least one control unit can thus directly or indirectly activate or deactivate the electronic filter device.
  • the electronic filter device is activatable by the at least one in-vehicle control unit depending on an operating mode and/or a speed of the rail vehicle.
  • the switch can be connected to the control system or at least to an in-vehicle control unit so that the filter function of the electronic filter device is not accidentally left deactivated during the operation of the rail vehicle. If certain conditions prevail, such as, for example, if the maintenance mode of the rail vehicle is deactivated or if the rail vehicle has a speed higher than e.g. 5 km/h, the filter function of the electronic filter device is forcibly reactivated. The correct function of the electronic filter device can thereby be guaranteed.
  • the electronic filter device is automatically activatable by the at least one in-vehicle control unit.
  • the hardware filter can be forcibly reactivated by the at least one control unit through the automatic activation of the electronic filter device despite an error on the part of maintenance personnel or a forgotten manual activation of the hardware filter.
  • the electronic filter device is connected, having a data transmission capability, directly or via a network to the at least one in-vehicle control unit.
  • the at least one in-vehicle control unit can be connected directly to the hardware filter or to the electronic filter device.
  • the electronic filter device can be integrated into the at least one in-vehicle control unit or can be connected via a data cable to the at least one control unit.
  • the electronic filter device can be coupled via a network to the at least one in-vehicle control unit.
  • the network can preferably be an Ethernet network, a vehicle network or a vehicle bus of the rail vehicle. The entire network or a communication with a plurality of components can thus be secured by the electronic filter device.
  • the filter unit or filter device can preferably be designed as dedicated hardware or as a control device or can be integrated into existing hardware, such as, for example, a control unit.
  • the at least one in-vehicle interface is a wireless communication device or a service interface.
  • the at least one in-vehicle control unit can be of flexible design and can offer a multiplicity of different coupling options.
  • a method for transmitting data with a system according to the invention is provided.
  • a wireless or wired communication connection is established between the at least one in-vehicle interface and at least one external server unit.
  • Data can be transmitted unidirectionally or bidirectionally via the established communication connection.
  • the data can be transmitted in the form of packets or messages.
  • the data transmitted to the at least one in-vehicle interface are verified by an electronic filter device.
  • the permissible and/or valid data verified by the electronic filter device are forwarded unchanged by the electronic filter device to at least one in-vehicle control unit.
  • the impermissible and/or invalid data verified by the electronic filter device are blocked by the electronic filter device or are transmitted back to the at least one in-vehicle interface.
  • Corresponding control devices having a filter function according to the invention can furthermore be more easily authorized, since the necessary supporting evidence can be provided in a technically simple manner. This can be achieved by checking the filter function and the absence of a disadvantageous impact on an operation of the vehicle by the filter function.
  • a technically simple protection of the control systems of a vehicle can be guaranteed by the method according to the invention.
  • a manipulation-proof protection against unauthorized access to the control systems of the rail vehicle can be implemented by the electronic filter device.
  • the electronic filter device is activated or deactivated via a switch or the at least one in-vehicle control unit.
  • the electronic filter device can thereby be controllable via a mechanical or electronic switch.
  • the hardware filter can be bypassable by means of the switch.
  • the electronic filter device can be activatable or deactivatable by at least one in-vehicle control unit. The filter function can thus be disabled, thereby enabling unrestricted access to all control devices in the vehicle.
  • the electronic filter device is disposed in a rail vehicle and is automatically activated in a deactivated state depending on time, speed and/or an operating mode of the rail vehicle.
  • a forcible activation of the electronic filter device which corrects an accidental deactivation of the filter function can thus be implemented.
  • FIG. 1 shows a schematic representation of a system according to a first example embodiment according to the invention
  • FIG. 2 shows a schematic representation of a system according to a second example embodiment of the invention.
  • FIG. 1 shows a schematic representation of a system 1 according to a first example embodiment according to the invention.
  • the system 1 has a rail vehicle 2 and an external server unit 4 .
  • the external server unit 4 is, for example, a control center or operational center for monitoring and controlling rail traffic.
  • the rail vehicle 2 has a communication device 6 which can establish a wireless communication connection 8 to a communication device 10 of the external server unit 4 for bidirectional transmission of data or data packets.
  • the communication connection 8 is configured here as a mobile radio connection, for example via a UMTS or LTE network.
  • the data transmitted by the external server unit 4 can be received by the communication device 6 of the rail vehicle 2 .
  • the communication device 6 of the rail vehicle 2 is an in-vehicle interface 6 .
  • the data are then forwarded by the communication device 6 to an electronic filter device 12 .
  • the electronic filter device is designed as integrated into a separate control device 14 of the rail vehicle 2 .
  • the permissible data are forwarded by the filter device 12 to at least one in-vehicle control unit 16 , 18 .
  • the rail vehicle 2 has, by way of example, two in-vehicle control units 16 , 18 .
  • the control units 16 , 18 can receive and process the transmitted data.
  • the in-vehicle control units 16 , 18 are configured as two independent control devices for processing or calculating data.
  • the two control units 16 , 18 are coupled via a network 24 to the filter device 12 for data communication purposes.
  • a switch 20 is disposed in the rail vehicle 2 to deactivate and activate the filter device 12 .
  • the control device 14 can be thereby bypassed.
  • An in-vehicle control device 16 is similarly coupled to and can automatically actuate the switch 20 .
  • the electronic filter device 12 can thus be automatically activated, provided that the rail vehicle 2 is moved at a defined speed.
  • FIG. 2 shows a schematic representation of a system 1 according to a second example embodiment according to the invention.
  • the rail vehicle 2 has a second in-vehicle interface 7 which is designed as a service interface 7 .
  • a diagnostic device 22 can be coupled via a wired communication connection 9 to the service interface 7 for maintenance work purposes.
  • the diagnostic device 22 may, for example, be a tablet or notebook which is connectable via a cable 9 to the in-vehicle interface 7 .
  • Direct access to the control units 16 , 18 can thereby be implemented, wherein the data transmitted via the communication connection 9 are checked by the electronic filter device 12 .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Mechanical Engineering (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Small-Scale Networks (AREA)
  • Train Traffic Observation, Control, And Security (AREA)
  • Electric Propulsion And Braking For Vehicles (AREA)
US16/764,503 2017-11-15 2018-11-07 System and method for the protected transmission of data Active 2041-06-22 US11916877B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102017220370.6A DE102017220370A1 (de) 2017-11-15 2017-11-15 System und Verfahren zum geschützten Übertragen von Daten
DE102017220370.6 2017-11-15
PCT/EP2018/080430 WO2019096643A1 (de) 2017-11-15 2018-11-07 System und verfahren zum geschützten übertragen von daten

Publications (2)

Publication Number Publication Date
US20210014199A1 US20210014199A1 (en) 2021-01-14
US11916877B2 true US11916877B2 (en) 2024-02-27

Family

ID=64477086

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/764,503 Active 2041-06-22 US11916877B2 (en) 2017-11-15 2018-11-07 System and method for the protected transmission of data

Country Status (8)

Country Link
US (1) US11916877B2 (de)
EP (1) EP3688958B1 (de)
DE (1) DE102017220370A1 (de)
ES (1) ES2886209T3 (de)
HU (1) HUE056795T2 (de)
PL (1) PL3688958T3 (de)
RU (1) RU2734764C1 (de)
WO (1) WO2019096643A1 (de)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102019209338A1 (de) * 2019-06-27 2020-12-31 Siemens Mobility GmbH Vorrichtung zum Übertragen von Daten zwischen einem spurgebundenen Fahrzeug und einer landseitigen Datenverarbeitungseinrichtung
DE102019218875A1 (de) * 2019-12-04 2021-06-10 Siemens Mobility GmbH Überprüfungsverfahren für eine Vorrichtung und System
DE102022206426A1 (de) * 2022-06-27 2023-12-28 Siemens Mobility GmbH Verfahren zur Absicherung einer Datenverbindung

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011076350A1 (de) 2011-05-24 2012-11-29 Siemens Aktiengesellschaft Verfahren und Steuereinheit zur Erkennung von Manipulationen an einem Fahrzeugnetzwerk
US20130151111A1 (en) 2011-12-12 2013-06-13 Clay Skelton Systems, Devices and Methods for Vehicles
DE102014212484A1 (de) 2014-06-27 2015-12-31 Siemens Aktiengesellschaft Datennetzwerk einer Einrichtung, insbesondere eines Fahrzeugs
WO2017024078A1 (en) 2015-08-03 2017-02-09 Icon Labs A method for detecting, blocking and reporting cyber-attacks against automotive electronic control units
WO2017024076A1 (en) 2015-08-04 2017-02-09 The Regents Of The University Of California Cell transplantation device
US20170093866A1 (en) * 2015-09-25 2017-03-30 Argus Cyber Security Ltd. System and method for controlling access to an in-vehicle communication network
WO2017077857A1 (en) 2015-11-02 2017-05-11 Sony Corporation Communication between a vehicle ecu and external devices in proximity
US20170310674A1 (en) 2016-04-26 2017-10-26 Honeywell International Inc. Approach for securing a vehicle access port
US20190337526A1 (en) * 2016-10-06 2019-11-07 Red Bend Ltd. Systems and methods for handling a vehicle ecu malfunction

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9471770B2 (en) 2011-05-24 2016-10-18 Siemens Aktiengesellschaft Method and control unit for recognizing manipulations on a vehicle network
DE102011076350A1 (de) 2011-05-24 2012-11-29 Siemens Aktiengesellschaft Verfahren und Steuereinheit zur Erkennung von Manipulationen an einem Fahrzeugnetzwerk
US20130151111A1 (en) 2011-12-12 2013-06-13 Clay Skelton Systems, Devices and Methods for Vehicles
DE102014212484A1 (de) 2014-06-27 2015-12-31 Siemens Aktiengesellschaft Datennetzwerk einer Einrichtung, insbesondere eines Fahrzeugs
US20170134342A1 (en) 2014-06-27 2017-05-11 Siemens Aktiengesellschaft Data Network Of A Device, In Particular A Vehicle
US10666615B2 (en) 2015-08-03 2020-05-26 Sectigo, Inc. Method for detecting, blocking and reporting cyber-attacks against automotive electronic control units
WO2017024078A1 (en) 2015-08-03 2017-02-09 Icon Labs A method for detecting, blocking and reporting cyber-attacks against automotive electronic control units
WO2017024076A1 (en) 2015-08-04 2017-02-09 The Regents Of The University Of California Cell transplantation device
US20170093866A1 (en) * 2015-09-25 2017-03-30 Argus Cyber Security Ltd. System and method for controlling access to an in-vehicle communication network
WO2017077857A1 (en) 2015-11-02 2017-05-11 Sony Corporation Communication between a vehicle ecu and external devices in proximity
US10940812B2 (en) 2015-11-02 2021-03-09 Sony Corporation System and method for facilitating communication via an electronic interface of a vehicle
US20170310674A1 (en) 2016-04-26 2017-10-26 Honeywell International Inc. Approach for securing a vehicle access port
US20190337526A1 (en) * 2016-10-06 2019-11-07 Red Bend Ltd. Systems and methods for handling a vehicle ecu malfunction

Also Published As

Publication number Publication date
DE102017220370A1 (de) 2019-05-16
WO2019096643A1 (de) 2019-05-23
PL3688958T3 (pl) 2021-12-20
EP3688958A1 (de) 2020-08-05
RU2734764C1 (ru) 2020-10-23
EP3688958B1 (de) 2021-07-28
HUE056795T2 (hu) 2022-03-28
ES2886209T3 (es) 2021-12-16
US20210014199A1 (en) 2021-01-14

Similar Documents

Publication Publication Date Title
US11916877B2 (en) System and method for the protected transmission of data
Palanca et al. A stealth, selective, link-layer denial-of-service attack against automotive networks
US9646156B2 (en) System and method for detecting OBD-II CAN BUS message attacks
JP6578224B2 (ja) 車載システム、プログラムおよびコントローラ
US10875502B2 (en) Monitoring and modifying motor vehicle functions in a motor vehicle
US9471770B2 (en) Method and control unit for recognizing manipulations on a vehicle network
JP6964277B2 (ja) 通信遮断システム、通信遮断方法及びプログラム
CN107426285A (zh) 一种车载can总线安全防护方法和装置
US20130110328A1 (en) Control network for a rail vehicle
CN110393002B (zh) 用于在轨道车辆的第一网络和第二网络之间传输数据的方法和设备
US10081332B2 (en) System and method for shutting down an unlawfully utilized vehicle
US11938897B2 (en) On-vehicle device, management method, and management program
JP6782444B2 (ja) 監視装置、監視方法およびコンピュータプログラム
US7598846B2 (en) Vehicle disable system
US20190098047A1 (en) Controller area network frame override
KR101966345B1 (ko) Can 통신 기반 우회 공격 탐지 방법 및 시스템
WO2020085330A1 (ja) 電子制御装置、電子制御方法及びプログラム
JP6920667B2 (ja) 情報処理装置、情報処理システム、情報処理方法、及びプログラム
CN106965758B (zh) 具有通信设备的机动车辆
Braband What's Security Level got to do with Safety Integrity Level?
JP2017050719A (ja) 車載ネットワークシステム
KR102391791B1 (ko) 능동형 차량 사이버 해킹 대응장치 및 방법
US10425487B2 (en) Method for managing a first communication link, system comprising a first communication partner and a second communication partner, and a vehicle
EP3382945B1 (de) System zur übertragung von audio- und / oder videodaten und verfahren zur erteilung von sicherem zugang
CN111464969B (zh) 车载联网电子系统的控制方法

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LOHNEIS, GEORG;REEL/FRAME:054139/0449

Effective date: 20200924

AS Assignment

Owner name: SIEMENS MOBILITY GMBH, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SIEMENS AKTIENGESELLSCHAFT;REEL/FRAME:054162/0546

Effective date: 20200929

STPP Information on status: patent application and granting procedure in general

Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE